Hi [[ session.user.profile.firstName ]]

Insider Threats & People-Centric Approach to Security & Compliance

Join Tim Choi and Mayank Choudhary for a conversation about the growing concerns on insider threats and data loss. A new people-centric approach is needed and in this interview session, we will share the suggested approach to this security and compliance problem.

The audience can learn more about:
- What is people-centric security and how does it help organizations view their security and compliance program
- What are insider threats and why cross-functional initiatives between cybersecurity, HR, Legal, Ethics are key in 2020
- How to drive deterrence and change user behavior
- How to prevent data loss at the endpoint in 2020

This video interview will be broadcast LIVE during RSA Conference in San Francisco.
Recorded Feb 25 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, ObserveIT
Presentation preview: Insider Threats & People-Centric Approach to Security & Compliance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jun 16 2020 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training May 19 2020 4:00 pm UTC 45 mins
    Andrew Brown, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Apr 28 2020 4:00 pm UTC 45 mins
    Andrew Brown, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo - Enterprise Information Archiving Apr 28 2020 9:00 am UTC 47 mins
    Shannon Smith, Archiving Sales Specialist & Micah Wyenn, Sales Engineer of Proofpoint
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what' the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • 5 Steps to Building A People-Centric Insider Threat Program Apr 23 2020 1:00 pm UTC 60 mins
    Saikrishna (Sai) Chavali, Cybersecurity Specialist & Erich Anderson, Insider Threat Consultant
    Most organizations understand the challenge of external cyber-attacks. But many of today’s biggest threats come from within. According to a recent study from Ponemon Institute, insider threats of all types have risen 45% in just two years, racking up a 31% increase in average costs over the same time period.

    Whether it’s careless users, disgruntled employees or compromised accounts - the cost of insider threats is on the rise.
    Addressing this type of threat requires a completely different approach to cybersecurity. After all, traditional security solutions are not designed to stop legitimate users accessing systems within the enterprise – or manage the significant risks.

    To address this challenge head-on, organizations need to develop an insider threat program, which can provide visibility into insider-led data breaches and streamline response and investigation, while balancing the protection of corporate assets with employee privacy.

    Join this webinar to learn the top five steps for building and maintaining a people-centric insider threat program, with best practices and real-life examples that you can use, including:
    •What kinds of Insider Threats cost organizations the most?
    •How to determine if your organization is doing enough to address insider threats
    •Five elements to building an effective insider threat program
    •Designing an insider threat management strategy as a combination of people, processes and technology – in that order!
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français Apr 21 2020 12:00 pm UTC 34 mins
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Email Security: Why Now Is The Time To Review Your Strategy Apr 21 2020 9:00 am UTC 57 mins
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe Apr 21 2020 8:00 am UTC 48 mins
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Security Awareness Training – Your best line of defence Apr 21 2020 1:00 am UTC 39 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Protect your #1 Threat Vector : Email Security Apr 16 2020 1:00 pm UTC 60 mins
    Matt Cooke, CyberSecurity Specialist, Proofpoint
    In 2020, what is a cyber criminal’s weapon of choice? As attacks against your organisational firewalls fade away, what’s next? Leading research from the FBI and Forrester Wave shows that email is today's number one threat vector and the threat email poses changes and evolves more rapidly than ever before. If you work in Information Security, you already know that you and your team have a hard time keeping up with the volume of attacks coming from email.

    Join Matt Cooke of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, and in particular you will learn:
    - The latest threat data and trends for email cyber attacks
    - How best to defend your people and data with Proofpoint Targeted Attack Protection
    - How to streamline your incident response process for emails

    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business

    About Proofpoint

    Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com. ©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.
  • The Private Life of Data Apr 16 2020 9:00 am UTC 60 mins
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Digital Risk Analyst, Proofpoint
    Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data that is not going to generate any value for the organization.

    As a CISO or Legal compliance officer, your data may sometimes feels like a precocious and unruly child, and all the while your job is to protect and nurture it.

    Join this Proofpoint webinar to discover how to develop a modern e-discovery and compliance strategy, including:
    - How to control the costs associated with exponential data growth and storage
    - How to mitigate financial harm and reputation risk by protecting the data of your employees and clients
    - How to retain, discover and supervise your data while adhering to complex and changing international regulations

    Join us as we share over 15 years of experience and demonstrate best-practice in data protection, archiving and compliance in 2020

    About Proofpoint
    Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com. ©Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners.
  • Dos and Don’ts for Business Email Compromise (BEC) & Email Account Compromise Apr 15 2020 5:00 pm UTC 60 mins
    Sara Pan, Sr. Product Marketing Manager of Proofpoint
    The financial losses associated with Business Email Compromise (BEC) and Email Account Compromise (EAC) continue to rise. The FBI reported losses of almost $1.7B in 2019 alone. While BEC and EAC start to become one of CISO’s top concerns, there are still a lot of confusion regarding the terms. In addition, many organizations are struggling to identify the scope of the problem regarding BEC/EAC. So how can you better manage this billion-dollar problem in your organization?

    Join us for a deep dive into the dos and don’ts when it comes to BEC and EAC. In this webinar, we’ll be discussing:

    - What is BEC and EAC
    - What do they have in common and how are they different
    - Why is it difficult to prevent BEC/EAC
    - What are the best practices to help you mitigate BEC/EAC risks
  • Security Awareness Training –Your best line of defence Apr 14 2020 2:00 pm UTC 31 mins
    Paul Down, Director & Matt Cooke, Cyber Security Specialist
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Strategies for Better SOC Efficiency Apr 9 2020 5:00 pm UTC 60 mins
    Vivek Indrayan, Product Manager & Joseph Yun, Security Automation & Orchestration Principal Analyst
    Security teams face many challenges responding to threats targeting your people. Most deal with an overwhelming number of alerts and a struggle to reduce the significant time it takes to respond to and remediate threats. Join this webinar and live demo to see how Proofpoint helps organizations respond faster and more efficiently by delivering full security orchestration, automation and response.

    In this webinar, you will see:

    - How you can enhance your SOC efficiency

    - How to respond faster to incidents

    - How to better protect the number one threat vector (email) and beyond
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 Lures Apr 8 2020 9:00 am UTC 48 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Targeted attacks start with email, and these security threats are always evolving. Just in the past few weeks alone, the Email lures leveraging the currently challenging times as a unique theme now represents the greatest collection of attack types that the Proofpoint Threat Research and Detection team has seen in years, if not ever.

    We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures to exploit your employees, during these heightened emotional times.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they take a deep dive into these tactics and share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defence mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    Please note: This webinar won’t have a live Q&A as this is a replay; you can still send us your questions and we will get in touch via email after the session.
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training Apr 7 2020 2:00 pm UTC 23 mins
    Andrew Brown, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • 2020 Cost of Insider Threats Global Report Apr 7 2020 9:00 am UTC 46 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • State of the Phish 2020 Apr 2 2020 9:00 am UTC 32 mins
    Paul Down, Director, Proofpoint EMEA
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Live Demo - Enterprise Information Archiving Mar 31 2020 5:00 pm UTC 45 mins
    John Price, Sr. Archiving Sales Specialist and Mike Fenili, Sr. Sales Engineer
    Today’s businesses generate a lot of communications data, in a lot of formats and in a lot of locations, from computers and on-prem servers to mobile devices and the cloud. Developing a modern data archiving and compliance strategy isn’t easy, especially as regulations continue to evolve. How do you scale your infrastructure to accommodate the data growth and ensure your supervision teams can keep up?

    Join us for a live demo as we take an in-depth look at how Proofpoint solves the data archiving and compliance challenges of the modern enterprise.

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with evolving industry rules and regulations
    - Improve visibility into your archived data
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Mar 26 2020 42 mins
    Joshua Whisnant, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Insider Threats & People-Centric Approach to Security & Compliance
  • Live at: Feb 25 2020 10:30 pm
  • Presented by: Tim Choi, VP Product Marketing, Proofpoint & Mayank Choudhary, SVP Product Management, ObserveIT
  • From:
Your email has been sent.
or close